Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
johnlloyd13
New Contributor III

FortiGate Optimum MTU and TCP MSS

hi,

i recently migrated from ASA to FGT and received complaints that HTTPS traffic is very "slow".

when i moved back to ASA, it works fine.

i suspect there's an issue in MTU or TCP MSS or both along the path.

1) can someone advise what is the "optimum" value for MTU and TCP MSS?

2) is there a way to know/test this from client machine?

3) should i set either one or both to 1400 or 1300 to avoid "slowness" issue?

 

config system interface
edit "wan"
 set mtu-override enable <<< DO I NEED TO ADD THIS?
 set mtu <MTU Value>
 set tcp-mss <MSS Value>

 next

 

edit "lan"
 set mtu-override enable <<< DO I NEED TO ADD THIS?
 set mtu <MTU Value>
 set tcp-mss <MSS Value>

 

 

2 REPLIES 2
BillH_FTNT
Staff
Staff

Hi johnlloyd13,

There are many differences between ASA and FortiGate. Could you please provide the following details to help us better understand your setup?

  • The policies (rules) configured in ASA and the equivalent policies you're using in FortiGate
  • Relevant security logs
  • If possible, could you create a test policy in FortiGate to verify the behavior , debug, sniffer, check logs ?

Regards

BIll

 

johnlloyd13

hi,

it's just a simple SNAT/PAT rule using the egress interface public IP.

the logs, session view looked "normal".

it was just slow web/HTTPS traffic browsing experience for the end users.

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors